Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 10 of 10 matches in All Departments
This volume reveals to readers the impact of recent events on diplomacy a year or so into the post-Cold War world, describing disintegration in the East, integration in the West, new relations with old allies, changes in the Third World, and multilateral diplomacy.
This paper calls for a new NATO strategic concept and a new transatlantic compact, and envisions crafting them in tandem. Both are needed because they are intended to perform separate but interdependent functions. Whereas a new strategic concept would help energize NATO, a new transatlantic compact would help energize the overall U.S.-European partnership. Together, they would have a compounding effect, because each would reinforce and amplify the other.
In the face of growing difficulties for U.S. regime change policies in the Middle East, analysts and policy makers are considering the viability of returning to a set of policies with a greater emphasis on the status quo. A great deal of thought must be given to determining exactly how these two imperatives are to be blended together in the interests not only of overall policy coherence, but also to actually achieve the goals being sought. Serious analysis, rather than reliance on simplistic formulas, is needed. Without pretending to solve the myriad foreign policy dilemmas facing the United States and its allies, this paper offers a framework for how this analysis can be conducted, and where it can lead. The perspective is global, but along the way, insights are offered on the Middle East.
Operation Anaconda, conducted in the Shahikot Valley of Afghanistan during early March 2002, was a complex battle fought in rugged mountainous terrain under difficult conditions. The battle ended as an American victory at the cost of eight U.S. military personnel killed and more than 50 wounded. But the difficult early stages of the battle provide insights for thinking about how to organize, train, and equip U.S. forces for future joint expeditionary operations and how to pursue transformation.
This paper assesses key issues in U.S. defense spending in the next decade and is intended to serve as a guide to analyzing the fiscal year 2006 budget submission. Wartime expenses aside, the big spending increases of recent years seem unlikely to be repeated far into the future. Persistent federal deficits and growing domestic entitlement programs will constrain the amount of money that can be spent on military preparedness. The defense budget may level off just as it should rise to accommodate high operating costs and mounting requirements for military transformation. If so, budget constraints will compel a concerted effort to spend available defense funds as wisely as possible. Spending patterns and priorities will change, and tradeoffs will be necessary. If pressures on the defense budget increase, the biggest challenge facing the Department of Defense (DOD) will be determining how best to pursue two key transformation goals. The first goal is strengthening ground forces and related joint capabilities for expeditionary operations along the "southern arc of instability" in the near to mid term. The second goal is enhancing strategic dominance over future peer adversaries over the long term through acquisition of new platforms, space systems, and similar high-tech assets. Within this framework, DOD will need to address other weighty issues. Should investments in ground forces increase? If so, what priorities should be pursued? Can savings be extracted from support programs and from the operations and maintenance (O&M) budget to help fund investments? If so, how? Should spending on basic research increase? If so, can development of new technologies be accelerated while controlling costs? How should scarce procurement funds be allocated among new weapons emerging from research, development, testing, and evaluation? What is the best budget strategy for the long haul? Should the U.S. government create an overall national security budget for the interagency community? Careful analysis of each of these issues is necessary, individually and collectively. The budget and program decisions flowing from the analysis will have major implications for future U.S. forces. This study recommends focusing on enhancing expeditionary warfare capabilities, while not denuding long-term transformation. In particular, it argues that, if DOD is to pursue ambitious transformation plans for both goals, it will need to find savings elsewhere.
One of the missions of the Center for Technology and National Security Policy at National Defense University is to study the transformation of America's military and to explore the consequences of the information revolution. During the last two decades of the 20th century, through a series of internal and external studies and policy pronouncements, the Department of Defense dramatically shifted its view of the nature of future military operations and the associated equipment, doctrine, tactics, and organization that were required. The names varied ("Reconnaissance/Strike Warfare," "Revolution in Military Affairs," "Network Centric Warfare," "Transformation"), but the basic premise was the same: The explosive changes in information technology would transform the future of military operations. The benefits of this change have been well documented, but its potential vulnerabilities have been less commonly described-or addressed for corrective actions. These actions must begin with a recognition of the new relationship between traditional defense systems and modern information technologies. Traditional warfare systems are developed, ruggedized, hardened, secured, and tested to ensure the highest level of performance and availability. As military systems become more software intensive (in both computers and communications), greater time and cost increases occur because of increased system complexity and the lack of vigorous software processes, especially when compared with more mature, hardware intensive engineering and development processes. For the most part, military systems are proprietary and communicate securely with little effect on performance. Current military weapons and combat platform system acquisitions have very high costs and extremely long lead times. This high expense and long preparation is attributed, in part, to the complexity of new system designs and to the rigidity of design processes that are needed to meet mission-critical battlefield requirements of high reliability, ease of maintenance, and built-in safety systems. The acquisition process itself introduces costs and delays because it must meet legal and regulatory demands designed to ensure openness and fiscal responsibility. These methods have produced formidable systems; American superiority in high-tech weapons development is acknowledged worldwide. In contrast to military systems, commercial information systems can be developed, marketed, and upgraded within a 2-year life cycle. The introduction and adoption by industry of new technologies such as wireless, voice over Internet protocol (VOIP), and radio frequency identification devices (RFID) are rapid, with little design concern for security and privacy. Introduction of this technology in the commercial market is based on user acceptability, legal consequences, and bottom-line cost analysis, not on considerations of safety, potential loss of life, or national security policy. In spite of these potential problems with commercial systems, their advantages-rapid deployment of state-of-the-art technology (consequently, higher performance) and far lower cost (because of much higher volume)-make them extremely attractive. Thus, over the past decade, Defense Acquisition Reform has been focused on developing processes to achieve both the high-performance and low-cost benefits that come from using commercial technology while still assuming the necessary mission objectives of high reliability, rugged environmental capability, and (particularly) security. This volume examines threats and vulnerabilities in the following four areas: physical attacks on critical information nodes; electromagnetic attacks against ground, airborne, or space-based; information assets; cyber attacks against information systems; attacks and system failures made possible by the increased level of complexity inherent in the multiplicity of advanced systems.
Recent military operations in Afghanistan and Iraq were characterized by the rapid defeat of enemy military forces, by relatively small deployments of American forces, and by a very limited destruction of the critical civilian infrastructure. This success can be credited in large part to the ongoing transformation of the U.S. military evident in its effective use of information superiority, precision strike, and rapid maneuver on the battlefield.
This lexicon is inten ded as a tool to he lp strip aw ay one source of the endem ic miscommunication and friction that now plagues both soldiers and civilians, governm ent and non-government, who plan, coordinate, and execute the complex set of overlapping civil-military activities and tasks th at have come to charact erize armed conflicts and their afterm ath. Collectively known as complex operations1, they demand, but too often lack, a sense of common purpose and m utual understanding be tween a wide array of planne rs and practitioners, all of whom bring with them different organizati onal cultures, world visions, and operational approaches. These disconnects can, and too often do, create conf usion, at tim es with tragic results, both on the ground and among policy-m akers. Part of that confusion stem s from the widely varied vocabulary used by these m any actors. Each organization possesses their own unique terminology, perfectly clear to them, but foggy to others. Even when words look and sound familiar they often have quite different and sometimes alien meanings. Anyone who has attended an acronym and jargon -laced coordination meeting of m ilitary, civilian government, and NGO representatives knows the frustration of trying to interpret what is meant by words that have many different connotations. It is in hopes of lessening this confusion that this lexicon has been compiled.
CONTENTSPart I- Foundations of TransformationChapter 1- Assessing New MissionsChapter 2- Harnessing New TechnologiesChapter 3- Choosing a StrategyPart II- Transforming the ServicesChapter 4- The Army: Toward the Objective ForceChapter 5- The Naval Services: Network-Centric WarfareChapter 6- The Air Force: The Next RoundPart III- Coordinating Transformed Military OperationsChapter 7- Integrating Transformation ProgramsChapter 8- Transforming JointlyChapter 9- Coordinating with NATOPart IV- Broader Aspects of TransformationChapter 10- Strengthening Homeland SecurityChapter 11- Changing the Strategic EquationChapter 12- Controlling SpaceChapter 13- Protecting CyberspaceChapter 14- Maintaining the Technological LeadChapter 15- Getting There: Focused Logistics
|
You may like...
School-University-Community…
R. Martin Reardon, Jack Leonard
Hardcover
R2,675
Discovery Miles 26 750
Snyman's Criminal Law
Kallie Snyman, Shannon Vaughn Hoctor
Paperback
Little Bird Of Auschwitz - How My Mother…
Alina Peretti, Jacques Peretti
Paperback
Twice The Glory - The Making Of The…
Lloyd Burnard, Khanyiso Tshwaku
Paperback
|